Over 20,000 Chinese users have had their Windows PCs infected with a new strain of ransomware that encrypts their files and demands a 110 yuan (~$16) ransom.
The ransomware is exclusively targeting the Chinese internet space, and there’s no threat to international users, at least yet.
This is because the person/group behind this threat are exclusively using Chinese-themed apps to distribute the ransomware via local sites and forums. Further, they are also requesting ransom payments via the WeChat payment service, only available in China and adjacent regions.
According to multiple local news reports [1, 2, 3, 4], users have reported being infected with this ransomware after installing several social media-themed apps, but mostly after installing an app named “Account Operation V3.1,” an app for helping users manage multiple QQ accounts at the same time.
Security experts who analyzed the app said the ransomware, besides encrypting files, also included an information-stealing component that harvested login credentials for several Chinese online services, such as Alipay (digital wallet), Baidu Cloud (personal cloud file hosting), NetEase 163 (email service), Tencent QQ (instant messaging), and Taobao, Tmall, and Jingdong (online shopping platforms).
Formal complaints have been filed with local law enforcement, but it’s unclear at this moment if authorities have identified the hacker or hacker group behind this sudden ransomware outbreak.
Unless the ransomware authors used fake or fraudulently-obtained IDs to create their WeChat payment handling profiles, most victims said they expected police to track the criminals down. It is widely known that Chinese authorities have the capabilities to track WeChat payments and identify the people behind suspicious operations.
This latest ransomware campaign is also not the first time Chinese-based ransomware authors have used WeChat as a ransom payment handling method. Those who made this fatal mistake in the past have been arrested by authorities within months, such as the case of a duo arrested in July, last year.
Chinese police, overall, have a good track record of arresting hackers within weeks or months after a particular malware campaign makes headlines. For example, they previously took only a month to track down and arrest the people behind the Fireball adware, four days to track down a hacker extorting local travel agencies, and less than a month to identify a hacker who was selling data of millions of hotel guests on the Dark Web.
As for the victims of this recent ransomware campaign, local Chinese cyber-security firms claim the ransomware can be decrypted without paying the ransom. Some companies have started working on free decrypters, which they plan to make available.
While ransomware campaigns have largely died down in most Western countries, they are still a common occurrence in China. A report by Velvet Threat Intelligence (火绒威胁情报系统), a Chinese cyber-security firm, claims that ransomware strains have encrypted more than two million computers in China in the first nine months of the year.
Related ransomware coverage:
- SamSam ransomware created by Iranian hackers, says US DoJ
- City of Valdez, Alaska admits to paying off ransomware infection
- Ransomware: Not dead, just getting a lot sneakier
- WannaCry ransomware crisis, one year on
- GandCrab ransomware crew loses $1M after Bitdefender releases free decrypter
- Moscow’s new cable car system infected with ransomware two days after launch
Source Article from https://www.zdnet.com/article/over-20000-pcs-infected-with-new-ransomware-strain-in-china/#ftag=RSSbaffb68
Over 20,000 PCs infected with new ransomware strain in China
Latest blogs for ZDNet
Latest blogs for ZDNet